that "the embedded data can rather be fragile(delicate) than be very robust(strong).

" Actually, embedded data are fragile in most steganography programs. Especially, Qtech Hide & View program embeds data in an extremely fragile manner. We demonstrate this in the other page. Today, digital contents are getting more and more commonly distributed by Internet than ever before. For example, music companies release new albums on their Webpage in a free or charged manner. A content owner classify his/her digital contents in a folder-by-folder manner, and embed the whole folders in some large vessel according to a steganographic method using folder access keys, and upload the embedded vessel (stego data) on his/her own Webpage. (2) On that Webpage the owner explains the contents in depth and publicize worldwide. The contact information to the owner (post mail address, e-mail address, phone number, etc.) will be posted there. ) The title of the picture and some physical object information (2) The date and the time when the picture was taken (3) The camera and the photographer's information This problem is technically referred to as "Metadata (e.g., annotation data) in a media database system (a photo album software) are separated from the media data (photo data) in the database managing system (DBMS)." This is a big problem.

Applications of Steganography

Steganography is applicable to, but not limited to, the following areas. 1) Confidential (intended to be kept secret,entrusted with private info)communication and secret data storing 2) Protection of data alteration 3) Access control system for digital content distribution 4) Media Database systems

. If the sender of the information wanted to obscure the message - for purposes of military intelligence, for instance - they would use steganography: the wax would be scraped(rubbed) off and the message would be inscribed or written directly on the tablet, wax would then be poured on top of the message, thereby obscuring not just its meaning but its very existence[1]. According to Dictionary.com, steganography (also known as "steg" or "stego") is "the art of writing in cipher, or in characters, which are not intelligible(understandable) except to persons who have the key; cryptography" [2].

. to their hard drive. Sometimes an actively enforced security policy can provide the answer: this would require the implementation of company-wide acceptable use policies that restrict the installation of unauthorized programs on company computers. or some other covertext and.a one-way hash value (where you take a variable length input and create a static length output string to verify that no changes have been made to the original variable length input)[4]. as opposed to simply discovering and decrypting the message. steganography can be said to protect both messages and communicating parties. messages will appear to be something else: images. thereby protecting the data from unauthorized or unwanted viewing The only way to detect steganography is to be actively looking for in specific files. classically. the technology is easy to use and difficult to detect. steganography can be used to tag notes to online images (like post-it notes attached to paper files). The word steganography is of Greek origin and means "concealed writing". a treatise on cryptography and steganography disguised as a book on magic. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia. as was pointed out in the concern for terroristic purposes. steganalysis. because this can be difficult to do unless the encryption keys are known. it can be used as a means of covert communication. The advantage of steganography. steganography can be used to maintain the confidentiality of valuable information. Further. including watermarking or a more secure central storage method for such things as passwords. which is the method of detecting steganography and destroying the original message. shopping lists. . if someone was trying to steal data. and may in themselves be incriminating(convicting) in countries where encryption is illegal. to protect the data from possible sabotage(disturbable r damage). this can be both a legitimate and an illegitimate application. they could conceal(hide) it in another file or files and send it out in an innocent looking email or file transfer.Therefore. or key processes. or unauthorized viewing[5]. or to get very lucky. Steganography is the art and science of writing hidden messages in such a way that no one. a person with a hobby of saving pornography. a form of security through obscurity(insignificance). Regardless. steganography can also be used for illegitimate reasons. articles. theft. or worse. Generally. the hidden message may be in invisible ink between the visible lines of a private letter. Furthermore. Plainly visible encrypted messages²no matter how unbreakable²will arouse suspicion. is that messages do not attract attention to themselves. steganography is an effective means of hiding data. There are many good reasons as well to use this type of data hiding. apart from the sender and intended recipient. And. Finally. suspects the existence of the message. over cryptography alone. Steganalysis focuses on this aspect. but the first step are awareness that such methods even exist. For instance. whereas cryptography protects the contents of a message. Of course. may choose to hide the evidence through the use of steganography. Unfortunately.

. Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface.The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples of steganography in The Histories of Herodotus. Wax tablets were in common use then as reusable writing surfaces. After his hair had grown the message was hidden. sometimes used for shorthand. who shaved the head of his most trusted slave and tattooed a message on it. Another ancient example is that of Histiaeus. The purpose was to instigate a revolt against the Persians.

Sign up to vote on this title
UsefulNot useful